Legal

This page contains an overview of our terms and policies.

This English text is for your convenience. For legal reasons the Dutch version of this text will prevail.

Table of contents

Terms of Use

Use of this website is subject to the following conditions:

General
These terms of use apply to websites owned by Cyso Hosting BV including www.cyso.com. By using this site you agree to comply with these terms of use.

Intellectual Property Rights
The texts, drawings, photographs, films, images, data, databases, software, names, trademarks and domain names, trademarks, logos and other elements of this site are protected by copyright and belong to Cyso Hosting BV. It is prohibited without prior written consent of Cyso Hosting BV to store (other than required for the website to view), reproduce, modify, publish, distribute or transmit, sell or otherwise transfer or grant any rights to third parties of information found on the website.

Unauthorized use of the website
You commit yourself to (1) not use the information in an unlawful matter (2) not use the website in any way that causes the website to be damaged, corrupted, interrupted, stop, or otherwise made less efficient (3) not use the website for transmission or posting of computer viruses or for transmission or posting of material of a slanderous, obscene or threatening nature (4) not use website in such a manner that would infringe on the rights of a natural person, legal or association, including, but not limited to, rights of privacy and intellectual property (5) not use the website for posting or transmission of material for promotional or publicity purposes without prior permission from Cyso Hosting BV, except if so requested by the recipient.

Links to other websites
This website may contain links to websites or web pages of third parties or otherwise refer to these. Cyso Hosting BV has no control over the content or other features of these websites or web pages and is in no way liable for the content or features. Any links by Cyso Hosting BV do not in any way imply approval of the content of these websites or web pages.

Advice on the website
Where, through the website, directly or indirectly, advice is offered regarding medical, legal, financial or other personal or business decisions, this advice is without any guarantee and without any liability on the part of Cyso Hosting BV. You always need a specialist to consult for additional information regarding the advice on your specific situation.

Applicable Law and Jurisdiction
Dutch law is applicable to this website.

Abuse and anti-spam policy

Our spam Policy, why?
Unlike senders of traditional “junk mail” who are required to pay for envelopes, materials and postage, senders of UBE/UCE can, given the nature of the internet, impose enormous costs on the recipients of their messages at little or no cost to themselves.
Costs imposed on UBE/UCE recipients include:

  • ISP bandwidth used to deliver UBE/UCE
  • additional IP infrastructure needed to handle UBE/UCE
  • time and money wasted in filtering out and deleting UBE/UCE.

Cyso believes that the above costs cannot be imposed on Internet users without justification. According to Cyso, the eradication of spam will lead to better and cheaper use of the Internet, and enable Cyso to provide its customers with an efficient and affordable service.

If you want to advertise your site, please use another method. The problem is that almost no one responds positively to spam messages. Many people send angry emails, and often these emails end up with the provider (us). We are obligated to respond to them. If we don’t, Cyso is likely to be included in various anti-spam filters, which would harm us and our other customers.

Our policy

  • Customers are prohibited from sending spam messages to any random Internet user and/or posting such messages in large numbers on Internet newsgroups via the Cyso network. This also applies if these actions are carried out by another provider but the intended website is hosted by Cyso.
  • Customers are prohibited from being temporarily or permanently connected to an insufficiently secured mail server in the Cyso network. The mail server is allowed to accept incoming email intended for the relevant domain(s), and to send email originating from the IP address(es) assigned by Cyso. It is explicitly forbidden to accept email outside the assigned network that is intended for transmission outside this network. In other words, the mail server is the beginning or endpoint for email, not an intermediary station. Cyso has the right to block an insufficiently secured mail server on the Internet without prior notice.
  • Bulk email is allowed if the so-called verified OPT-IN scheme is used. Mailings using a database in which the recipient has not authorized the sender (the customer) will be treated as spam, and Cyso will treat it as such upon receiving complaints.
  • Complaints about spam should be submitted by email to abuse@cyso.com. The complaint must include a complete copy, including original headers, of the possible spam email. After it has been determined whether the complaint actually concerns UBE or bulk UCE, the customer will receive an official warning: FTO (“First Time Offender”). If no response is received within 24 hours indicating that sufficient measures have been taken to prevent spam, Cyso reserves the right to ban the IP address(es) or site assigned by Cyso from the Internet.
  • Well-founded complaints against a customer who is already known as an FTO will result in Cyso removing the respective DNS records for a minimum period of 48 hours without prior notice. The customer will be informed that they have acquired the status of STO (“Second Time Offender”). Cyso reserves the right to definitively terminate the service to the customer without any right to a reduction in costs for the remaining subscription term. If an insufficiently secured server is used to send or forward spam, port 25 (SMTP) will be blocked for the respective IP address(es).
  • Customers who make the same mistake for the third time (TTO, “Third Time Offenders”) will always be permanently disconnected without any right to a reduction in costs for the remaining subscription term.
  • Cyso has the right to block data traffic from other networks in order to prevent or ward off spam. This may cause temporary outages of connection(s) to other networks.

If you have any questions or want to report spam, please use the email address abuse@cyso.com.

Acceptable Use Policy

If Cyso has provided you with a shell account, the following additional rules apply:

  1. You are not allowed to use the servers for illegal activities such as: spam, hacking, port scanning and harassing. We decide what’s illegal or not and our decision is final.
  2. It’s not allowed to use the servers to distribute warez, illegal software or MP3 and other copyrighted materials. We decide what’s illegal or not and our decision is final.
  3. Never give out your username and password to someone else. The account belongs to you only. It’s your responsibility.
  4. Don’t use large amounts of CPU time / memory or bandwith
  5. Don’t exceed your diskquota.

Please report abuse at abuse@cyso.com. Violation of the rules will indefinitely lead to cancellation of your account.

Fair Use Policy

To keep the costs of hosting your website and e-mail low, a lot of people use a shared hosting solution. In this solution the server is shared with different users. This is usually not a problem, as a server is capable of handling hundreds of websites. To make sure everybody gets what he pays for there is one rule:

  • Your website / email may not use a disappropriate amount of system resources on the server.

This rule is to prevent that a single website uses so much resources, that other websites would be work slowly of even not work at all. in If you’re in violation of our Fair use Policy we will contact you and work with you on a different solution. In some cases more efficient programming makes a website run better or maybe a dedicated server is the solution. The main goal our Fair use policy is to avoid abuse.

Domain Registration Policy

Registering Internet domain names though Cyso is subject to the following policies:

ICANN Policies

All parties registering ICANN-managed internet domains through Cyso Hosting B.V. are required to be familiar with ICANN’s generic educational information as described here. Furthermore, parties must comply with ICANN’s Registrants Benefits and Responsibilities.

Renewal Policy

Unless specified otherwise, all domains registered through Cyso will be renewed automatically. Customers need to inform Cyso at least 30 days before the expiry date which domains do not need to be renewed. Failure to indicate this is time for domains involved will result in automatic renewal and billing accordingly.

RIPE conditions

Customers who request dedicated IPv4 and/or IPv6 addresses or ranges from Cyso are required to be able to justify the reason. When requesting dedicated IP addresses, Cyso may request the arguments behind it and judge them according to RIPE policies.

For IPv4 addresses: IPv4 Address Allocation and Assignment Policies for the RIPE NCC Service Region
For IPv6 addresses: IPv6 Address Allocation and Assignment Policy

Microsoft terms

Customers using Microsoft software licenses through Cyso, are required to comply with Microsoft’s End User License Terms. These are provided with their contract. Using licenses provided by Cyso is only allowed as long as their contract with Cyso lasts.

Procedure Notice & Takedown

The following procedure applies if Cyso receives complaints about material offered by one of its customers and is hosted within Cyso’s network. This procedure follows the guidelines of the Dutch Hosting Provider Association and was compiled by ICTRecht.

Intermediary: Cyso Hosting B.V.
Client: Cyso Hosting B.V.’s client.

  1. If Intermediary receives a complaint through the complaint form, it shall confirm the receipt of the reporter as soon as possible. Intermediary checks the data as much as they can. In case of missing or incorrect information provided through the complaint form by the reporter, Intermediary will ask the reporter to provide additional information.
  2. In case the information is not or no longer online or is hosted by another provider, the Intermediary informs the reporter about this party. The complaint will then be considered resolved.
  3. If the reporter has not previously contacted the Client, Intermediary passes on the complaint to the Customer with a period of two working days to respond, and informs the reporter about passing on the complaint. Intermediary forwards the Client’s response to the reporter. He can then respond to Intermediary whether or not he agrees with the response. If so, then the complaint will be considered dealt with. Intermediary informs the Client about this. In case of an absence of a response by the Client within two business days, Intermediary will carry out the following steps.
  4. If the reporter asked for removal of the material, but the Client is unwilling to remove or modify the information, Intermediary will make its own assessment:
    1. If Intermediary itself considers the complaint to be justified and there is no question of an emergency, he will ask the Client to remove the material. If the Client has not removed it within 1 day, Intermediary will delete or block the material and informs the Client and reporter that this has happened. Intermediary explains the removal to the Client. The complaint is considered resolved.
    2. If Intermediary itself considers the complaint to be unfounded, it will inform the reporter about its motivation. The complaint is considered resolved.
  5. If the reporter asked for identification of the Client, but the Client does not want to reveal himself to the reporter, Intermediary will make its own assessment:
    1. If Intermediary itself considers the complaint to be justified and the reporter to have a real stake in identification of the Client, Intermediary will provide name and address (location data) from the Client to the reporter and inform the Client thereof. The complaint is considered resolved.
    2. If Intermediary itself considers the complaint to be unfounded, or the reporter has no real stake to identification of the Client, it will inform the reporter about its motivation. The complaint is considered resolved.
  6. If in the opinion of Intermediary, a case should be considered urgent or an emergency, then Intermediary will go through the above steps within one working day. The reporter has to motivate an emergency notification. Based on this motivation, the Intermediary will determine whether the notification will be handled within one business day.
  7. In case of a criminal interest, Intermediary can decide to leave the information online for these reasons. In this case, Intermediary will inform only the reporter.
  8. In addition to the above (external) procedure, Intermediary may go through the following internal steps themselves.

Additional steps at points 4 and/or 5:

  • If Intermediary itself is unable or unwilling to comment on the complaint, it will send the information received about the complaint to its legal adviser.
  • The legal advisor will inform the Intermediary about the steps to follow. Intermediary is responsible for the implementation and informs the Client and reporter about this. The complaint is considered resolved.

When actually removing or making materials inaccessible, Intermediary will act carefully and in proportion, with Intermediary preventing, as much as possible, legal material of the Client or others being made inaccessible.

Do you have a question?

What do you want to know? Contact us now.

Would you like us to contact you? Leave your details and we will call you back.